And here is the “planned ” cover of my new book, I hope you will like it as much as I did.
The book is planned to be published in August 2020 , and as usual I will have Ask The Expert Section with really big names from the industry, some work for Microsoft DART team, some are in the industry for more then 15 years and some of the experts published many books , please give me bit more time before i announce their name…
Anyone can be hacked. It is just a matter of time. Even the right technology, e.g. the best firewall or anti-virus application, can fall short of protecting your system against cyber-attacks since cybercriminals are always in search of finding new methods and ways to infiltrate into systems. Responding to an incident quickly will help an organization to minimise its losses, decrease vulnerabilities, rebuild services and processes. Therefore, at this very moment, it is significant to know the best practices to respond to a successful cyber attack.
Organization’s should have skilled employees and sophisticated tools to identify the threats or to respond and eliminate them. Without knowing the best practices of an incident response process, the organization will be an easy target for cybercriminals and be vulnerable to a cyber attack.
This book will be a guideline for organizations on how to address and manage the aftermath of a cyber attack, and how to control the cybersecurity breach in a way that decreases damage, recovery time and costs.
The book targets programmers, system administrators and all levels of users who deal with security of an organisation (IT, SOC, CSIRT or other teams). Our book will help them to identify a security incident, to build a series of best practices to stop an attack before it creates serious consequences.
WHAT YOU WILL LEARN?
- What is an Incident Response and Why it is important
- How to organize an incident response (IR) team
- Best practices for managing attack situations with your IR team
- Learn how to form, organize, and operate a product security team to deal with product vulnerabilities and assess their severity
- How to organize all the entities involved in product security response
- Responding to a security vulnerability based on Keepnet Labs processes and practices
- How to adapt all the above learnings for the cloud
The book is planned to have 17 chapters
|1. The Cybersecurity landscape and why Incident Response matters|
|2. Incident Response – Evolution and Current challenges|
|3. How to organize an Incident Response Team|
|4. Understanding the IR lifecycle with a Phishing Incident scenario|
|5. Key Metrics for a Phishing Incident Response|
|6. Incident Alerting and Reporting|
|7. Incident Handling|
|8. Incident Investigation|
|9. Incident Response – Containment and Eradication|
|10. Incident Recovery and Reporting|
|11. Real World Case Studies|
|12. Incident Response in the Cloud – Challenges and Opportunities|
|13. Handling a Phishing Incident in the Cloud|
|14. Building a Proactive Incident Readiness Culture|
|16. Incident Response Best Practices|
|17.Bonus : Ask the Expert Opinion|